Malware

hrtng IDA Plugin : Elevating IDA’s Capabilities For Advanced Malware Analysis

hrtng IDA plugin is a collection of tools, ideas and experiments from different sources I’ve found interesting and useful in my reversing work.

A practical guide to the reverse of a complex malware using the example of dissecting a FinSpy module with help of hrtng IDA plugin on securelist

There is no one place in menu where all functionality of the plugin grouped together. hrtng menu items placed closer to logically related standard IDA & Hex-Rays decompiler functions. Messages, menu items, popup windows and dialog boxes belong to this plugin are marked with “[hrt]” prefix.

The plugin requires Hex-Rays decompiler presence in your IDA installation. The plugin can be compiled with IDA SDK >= 7.3 but not well tested with old versions.

Special thanks to following peoples for their great plugins were used as base for my work:

  • Milan Bohacek, hexrays_tools and hexrays_hlight
  • HexRaysDeob by Rolf Rolles and Takahiro Haruyama
  • Karthik Selvaraj Krypton plugin
  • Ali Rahbar, Ali Pezeshk and Elias Bachaalany GraphSlick plugin
  • Markus Gaasedelen AVX support for the Hex-Rays x64 Decompiler

Features Of The Plugin:

Automation

  • Pull up comments from disasm to pseudocode view
  • Automatic renaming local and global variables, struct members
  • Automatic enum substitution
  • COM helper

Interactive Pseudocode Transformation

  • User interactive renaming/retyping assistance
  • Assists with changing type of structure member or local/global variable
  • reinterpret_cast
  • Collapse selection
  • “offsetof” convertor

Decryption

  • Strings/data/const decryption
  • Build stack strings (optionally with decryption)
  • Build array strings (optionally with decryption)
  • Mass strings decryption

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Redlib : A Private, Fast, And Secure Reddit Front-End

Redlib is an innovative private front-end for Reddit, designed to provide a seamless browsing experience…

19 hours ago

CVE-2025-21298 : Windows OLE Remote Code Execution Vulnerability

CVE-2025-21298 is a critical zero-click vulnerability in Windows Object Linking and Embedding (OLE) technology, which…

19 hours ago

Zebar : Revolutionizing Desktop Customization With Widgets

Zebar is an innovative tool designed to create customizable and cross-platform desktop widgets. It empowers…

19 hours ago

Egui : Revolutionizing GUI Development In Rust

egui (pronounced "e-gooey") is a simple, fast, and portable immediate mode GUI library written in…

19 hours ago

Hickory DNS : A Modern, Rust-Based Solution For DNS Security And Performance

Hickory DNS is a modern, Rust-based DNS client, server, and resolver designed with a focus…

19 hours ago

Nom : Mastering Data Byte By Byte With Essential Tools

Tools are essential implements designed to perform specific tasks, making work more efficient and precise.…

21 hours ago